Summary of Inside the Hunt for Russia’s Most Notorious Hacker

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

Inside the Hunt for Russia’s Most Notorious Hacker summary
Start getting smarter:
or see our plans


8 Overall

8 Importance

7 Innovation

9 Style


Was one of world’s most successful cybercriminals also a spy? Wired editor Garrett M. Graff explains how Zeus malware inventor Evgeniy Mikhailovich Bogachev and his criminal networks stole millions of dollars from individuals, businesses and banks worldwide between 2006 and 2014. Graff further explores how the FBI and other cybercrime experts worked to bring the Zeus networks down and reveals how their work inadvertently uncovered ties to Russian intelligence. getAbstract recommends this article to everyone interested in cybercrime, cybersecurity, and clandestine intelligence-gathering.

In this summary, you will learn

  • How Evgeniy Mikhailovich Bogachev successfully stole millions with his Zeus malware,
  • How the US government and cybersecurity experts took down Bogachev’s operation, and
  • What investigators discovered about Bogachev’s ties to the Russian government.

About the Author

Garrett M. Graff writes about tech and politics at Wired. He served as editor of Washingtonian and The Politico. His books include The Threat Matrix: The FBI at War in the Age of Global Terror



When FBI agent James Craig first began investigating Zeus malware in 2009, the software, which allows hackers to secretly monitor and steal the information that targets enter into websites, had already been in existence for nearly three years. Indeed, by the time Craig started tracking Zeus, the malware’s mysterious inventor, known as “Slavik,” was already rolling out an improved version of the malware called Jabber Zeus to a select network of thieves. This group specifically targeted banks and corporate accounts for big-ticket crime rather than relying ...

More on this topic

Customers who read this summary also read

Inside the Cyberattack That Shocked the US Government
Safety in the Cloud
Forget Apple vs. the FBI
The Constitution of Knowledge
The Malicious Use of Artificial Intelligence
Cyber Attacks

Related Channels

Comment on this summary